University of Florida Levin College of Law UF Law Scholarship Repository Faculty Publications Faculty Scholarship 1-1-2006 Down to the Wire: Assessing the Constitutionality of the National Security Agency's Warrantless Wiretapping Program: Exit the Rule of Law Fletcher N. Baldwin Jr. University of Florida Levin College of Law, [email protected] Robert B. Shaw Follow this and additional works at: http://scholarship.law.ufl.edu/facultypub Part of the Constitutional Law Commons, Fourth Amendment Commons, and the National Security Commons Recommended Citation Fletcher N. Baldwin, Jr. & Robert B. Shaw, Down to the Wire: Assessing the Constitutionality of the National Security Agency's Warrantless Wiretapping Program: Exit the Rule of Law, 17 U. Fla. J.L. & Pub. Pol'y 429 (2006), available at http://scholarship.law.ufl.edu/ facultypub/242 This Article is brought to you for free and open access by the Faculty Scholarship at UF Law Scholarship Repository. It has been accepted for inclusion in Faculty Publications by an authorized administrator of UF Law Scholarship Repository. For more information, please contact [email protected]. DOWN TO THE WIRE: ASSESSING THE CONSTITUTIONALITY OF THE NATIONAL SECURITY AGENCY'S WARRANTLESS WIRETAPPING PROGRAM: EXIT THE RULE OF LAW FletcherN. Baldwin, Jr.* & Robert B. Shaw*" .................................... I. INTRODUCTION II. WIRETAPPING-THE GENESIS ......................... A . Origins ........................................ 1. Olmsteadv. United States ....................... 435 437 438 THE PRESIDENT LACKS BOTH THE CONGRESSIONAL AUTHORIZATION AND INHERENT AUTHORITY TO EFFECTUATE THE NSA PROGRAM ......... A. The PresidentLacks CongressionalAuthority to Effectuate the NSA Program ....................... B. The PresidentLacks the InherentAuthority to Effectuate the NSA Program ....................... RECOMMENDATIONS TO CURE THE NSA PROGRAM'S ILLEGALITY ............................. III. 435 435 2. Nardone v. UnitedStates ....................... 3. Katz v. UnitedStates ........................... B. Keith and the Legality of Wiretappingfor Domestic Threats to NationalSecurity ....................... C. Attempts to Extend the Keith Doctrine to Foreign Threats ................................ D. The Legislative Response: FISA .................... E. September 11th and the Genesis of the NSA Program ... II. 430 440 442 444 447 449 450 456 462 Chesterfield Smith Professor ofLaw and Director, The Center For International Financial Crimes Studies, Levin College of Law, Holland Law Center, University of Florida, Gainesville, FL 32611; Honorary Fellow of Advanced Legal Studies, University of London. ** Research Fellow, The Center For International Financial Crimes Studies, Levin College of Law, Holland Law Center, University of Florida, Gainesville, FL 32611. I would like to thank Professor Fletcher Baldwin for sharing so generously with his time, talents, and scholarship. I would like to thank my brother, William, for his dearly appreciated friendship, my father, Bob for giving me the opportunity to succeed, and my mother, Eileen, who taught me to believe in myself and impressed upon me the value of perseverance. And of course, I would like to thank Jessica, for her love and support, without which, I would never have made it this far. * HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 429 2006 UNIVERSITY OFFLORIDA JOURNAL OFLAW& PUBLICPOLICY IV. V. [Vol. 17 CONCLUSION: THE RULE OF LAW: AN ESSENTIAL ELEMENT TO WINNING THE "WAR ON TERROR" ............ 463 EPILOGUE. ......................................... 469 I. INTRODUCTION The greatest collateral damage from the September 11, 2001, terrorist attacks has been borne by international and domestic law principles in the name of national and homeland security. While it is conceded that one of the primary duties of a constitutional government is to ensure the survival of its governing regime and the physical safety of its citizens, there is an equally important duty for the governing regime to preserve democracy and civil liberties, and to fulfill the duties and obligations assumed under international and humanitarian law. The late U.S. Supreme Court Chief Justice Earl Warren eloquently illustrated this delicate balance of national security interests and democratic principles in his majority opinion in United States v. Robel:' This concept of "national defense" cannot be deemed an end in itself, justifying any exercise of ... power designed to promote such a goal. Implicit in the term "national defense" is the notion of defending those values and ideals which set this Nation apart. For almost two centuries, our country has taken singular pride in the democratic ideals enshrined in its Constitution... It would indeed be ironic if, in the name of national defense, we would sanction the subversion of... those liberties.., which make the defense of the Nation worthwhile.2 Do Chief Justice Warren's words bear directly upon the "war on terrorism"? The hyperbole, as with its predecessor, "war on drugs," wears thin when it reflects a rule by law and no longer communicates a rule of law. The primary purpose of constitutional law is to maintain domestic and international order so that people may pursue their interests within a predictable legal framework. Such a legal framework depends upon 1. 389 U.S. 258, 264 (1968). 2. Id. HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 430 2006 DOWN TO THE WIRE: ASSESSING THE CONSTITUTIONALITY judicial interpretation of conflicting assumptions that function and operate within the national psyche. As the soul of the constitutional democracy, the rule of law reflects formal and informal obligations and agreements within a constitutional context and includes human rights not subject to majority rule. In this manner, the rule of law facilitates order and respect through expectations. These expectations are essential if society is to survive in a predictable, peaceful and secure fashion.4 However, within the context of present circumstances,5 Amitai Etzioni6 raises several important questions: "Under what conditions is democracy undermined?" 7 "Are citizens prepared to waive transparency and to give the Chief Executive full power with neither checks or balances?"' Etzioni concluded, "it is a gross misconception to argue that public safety measures entail a sacrifice of rights-or vice versa, that respecting rights entails sacrifices of the common good."9 The right to privacy is a traditional American expectation. At present, there is an exceptional tension between non-transparent National Security policies and expectations individuals have regarding civil liberties. Without judicial oversight, such weapons give free reign to one branch of government, the executive. As Justice Scalia suggested in Kyllo v. United States,'0 "the sanctity of the home deserves the highest protections of the Constitution."" Within the sanctity of the home resides an expectation of privacy of the heart, soul and mind. Such expectations run contrary to unsupervised total physical surveillance. Thus, to invade that expectation, government agents must in some manner work within the Fourth Amendment and employ a certain level ofjudicial scrutiny. Governmental 3. See How DID THIS HAPPEN? TERRORISM AND THE NEW WAR (James Hoge & Gideon Rose eds., 2001); ROLAND JACQUARD, IN THE NAME OF OSAMA BIN LADEN: GLOBAL TERRORISM AND THE BIN LADEN BROTHERHOOD (2002). Justice A. Kennedy, in Roper v. Simmons 543 U.S. 577, 577 (2005) said: "[Tlhe United States now stands alone in a world that has turned its face against the juvenile death penalty." 4. See, e.g., LON FULLER, ANATOMY OF LAW (Greenwood Press Reprint, New ed. 1977) (1968); EUGENE WALTER, TERROR AND RESISTANCE (1969); PETER BERGEN, HOLY WAR, INC. (2001). See also Karma Nabulsi, Just and Unjust War, in CRIMES OF WAR: WHAT THE PUBLIC SHOULD KNOW 224 (Roy Gutman et al. eds., 1999). 5. Roberta Smith, America Triedto Come To Terms with Terrorism: The UnitedStatesAntiTerrorismandEffective Death PenaltyAct of1996 v. BritishAnti-TerrorismLaw andInternational Response, 5 CARDOZO INT'L & CoMP. L. 249, 268-69 (1997). 6. AMITAI ETZIONI, How PATRIOTIC IS THE PATRIOT ACT? 9 (2004). 7. Id. at 9. 8. See generally id. 9. Id.at 45. 10. Kyllo v. United States, 533 U.S. 27 (2001). 11. See id. at 31. HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 431 2006 UNIVERSITY OF FLORIDA JOURNAL OF LAW& PUBLIC POLICY [Vol. 17 privacy invasions have occurred in the past, but none appear as egregious as those reported in the New York Times and known as 2the National Security Agency (NSA) Warrantless Wiretapping Program. On December 6, 2005, President George W. Bush met in the Oval Office with New York Times publisher Arthur Sulzberger, Jr., executive editor Bill Keller, and Washington bureau chief Phil Taubman.' 3 The President called the meeting to discuss the Times' plan to publish a story exposing the NSA's covert program that warrantless wiretapping of citizens.14 The President expressed strong concerns over the national security implications that would result from publishing the article, 5 and implored the Times to reconsider. 16 But the free press did not back down. 7 On December 16, 2005, the New York Times published a front page story by James Risen and Eric Lichtblau pertaining to the NSA program." The Times article focused upon warrantless eavesdropping and suggested that the NSA program was an abuse of executive power.' 9 The article, coming almost one year before mid-term elections, ignited a political hailstorm.2" Within days, a judge on the Foreign Intelligence Surveillance Court resigned in protest of the NSA program;2 ' House Democrats investigated the possibility of impeachment,22 and the Senate demanded immediate committee hearings.23 In response, the Bush Administration reaffirmed the wiretapping program and lashed out against any and all critics.24 The Administration argued that the NSA program was a vital weapon in the war against 12. See Sherman, infra note 13. 13. Gabriel Sherman, Why Times Ran Wiretap Story, Defying Bush, N.Y. OBSERVER (Dec. 26, 2005), available at http://observer.com/printpage.asp?iid=12123&ic=Off+the+Record (last visited July 12, 2006). 14. Id. 15. Id. 16. Id. 17. Id. 18. Eric Lichtblau & James Risen, Bush Lets U.S. Spy on Callers Without Courts, N.Y. TIMES, Dec. 16, 2005, at Al. 19. Id. 20. See Carol D. Leonnig & Dafia Linzer, Spy Court Judge Quits in Protest,WASH. POST, Dec. 20, 2005, at A01. 21. Id. 22. Deb Riechmann, Cheney Says President Has Spying Authority (Dec. 20, 2005), at http://breitbart.com/news/2005/l 2/ 20/D8EK9JP81.html. 23. Leonnig & Linzer, supra note 20. 24. David Johnston & Neil A. Lewis, Defending Spy Program,Administration Cites Law, N.Y. TIMES, Dec. 23, 2005, at A20. HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 432 2006 DOWN TO THE WIRE: ASSESSING THE CONSTITUTIONALITY terror." Placing the blame on bureaucratic inefficiency, the Administration argued that, in fighting the undeclared "war," the Constitution must reside in the Oval Office, and the NSA program was the only means permitting the speed and flexibility necessary to give a sufficient warning of an imminent terrorist attack.26 The controversy has yet to be resolved. Defendants and critics have assembled along political fault lines and are prepared to do battle over the program's constitutionality. Yet, for all the partisan posturing, little about the program is actually known by the public. The Administration's own statements establish that: (1) the NSA program monitors only international 25. Id. 26. Id. Did the President's advisors overlook the Internet? The global reliance of the Internet for commerce, communication, and information, legal and illegal is undisputed. Nonetheless, terrorists, hackers, and organized criminal syndicates also rely on the power and reach of the Internet to serve nefarious ends. For example, it is now widely known that al-Qaeda operatives used (and likely continue to use) Internet chat rooms and free, anonymous e-mail accounts to communicate. Further, captured laptops and debriefs of detained al-Qaeda agents reveal that terrorist interest in the computerized, Internet-connected components of America's critical infrastructures was both real and serious. Indeed, perhaps future al-Qaeda terrorist attacks will include an assault against the cyber backbone of vulnerable critical infrastructures, such as water supply systems or power generation facilities. Why would terrorists look to the Internet and not the telephone? The answer is surprisingly simple. Attacks in or through cyberspace comport with the terrorists modus operadi: asymmetrical warfare. In simple terms, asymmetric warfare is how the weak fight the strong: guerrilla tactics, suicide bombers, ambushes, and nighttime raids. It is also, in our 21st century world, the use of the Internet to exploit, disrupt, or incapacitate disproportionately powerful adversaries. By using cyberspace to conduct intelligence, communicate clandestinely, and even strike remotely, the Internet has now become a new battleground for terrorists like al-Qaeda. With this said, asymmetrical, computer attacks from either al-Qaeda types or teenage hackers do not exist in a vacuum, but are tied to the ubiquitous reliance of the Internet by individuals as well as businesses. The number of Internet users continues to grow, spurred by the falling price of computer technology, the growing accessibility of the Internet in rural areas, the availability of high speed Internet access, and, of course, the overwhelming power and economy of cyberspace. However, security vulnerabilities have become more frequent and more serious. Though not the work of terrorists, 2003 witnessed three major worldwide cyber security: Slammer SQL, MS Blaster, and Sobig. Collectively, these computer worms cost computer users hundreds of millions of dollars worldwide. Yet, the virulence and effectiveness of Slammer, Blaster, and Sobig can be traced not only to the originality of their programming code but also to the porous security that in 2006 continues to plague computers and the Internet worldwide. The overwhelming majority of personal and business computers still lack firewalls and frequently updated anti-virus software. Government computers continue to suffer break-ins as well. From the sophisticated prospect of cyberterrorism to the lone hacker looking for a cheap thrill, those who use the Internet for illegal ends including sending encrypted terrorist instructions remain undeterred by government "best practices." There are no conclusive cyber security best practices, yet NSA concentrates upon wiretaps as a "best practice." HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 433 2006 UNIVERSITY OF FLORIDA JOURNAL OF LAW & PUBLIC POLICY (Vol. 17 communications between the United States and a foreign country;2 7 (2) the program is triggered when a non-judicial "career professional" at the NSA has reasonable grounds to believe that one of the parties to a communication is a member of a foreign terrorist organization; 28 (3) the program targets U.S. citizens living within the United States; 29 and (4) the program does not require a warrant, before beginning surveillance.3" We intend this Article to be a commentary on the constitutionality of the NSA wiretapping program solely as it relates to the warrantless surveillance of U.S. citizens. We will focus upon the legal history as established through case law. We will then attempt to rebut the Administration's arguments in defense of the program, and within this context we will argue that the program cannot withstand legitimate constitutional scrutiny. The facts and law simply do not support the socalled NSA program that authorizes the surveillance. 27. Wartime Executive Power and the National Security Agency's Surveillance Authority: HearingBefore the S. Comm. on the Judiciary,109th Cong. (2006) (statement of Alberto Gonzales, Attorney General of the United States). 28. Id. 29. Press Briefing from Attorney General Alberto Gonzales and General Michael Hayden, Principal Deputy Director for National Intelligence (Dec. 19, 2005), available at http://www.whitehouse.gov/news/releases/2005/12/print/20051219-1.html (last visited July 12, 2006) [hereinafter Press Briefing]. When asked if American citizens were targeted by the NSA program, Attorney General Gonzales responded: To the extent that there is a moderate and heavy communication involving an American citizen, it would be a communication where the other end of the call is outside the United States and where we believe that either the American citizen or the person outside the United States is somehow affiliated with al Qaeda. Id. 30. Wartime Executive Power and the National Security Agency's Surveillance Authority: Hearing Before the S. Comm. On the Judiciary 109th Cong. (2006) (statement of Alberto Gonzalez, Attorney General of the United States). In lieu of a warrant, the program is triggered when an NSA official has reasonable grounds to believe that one party to the communication is affiliated with alQaeda. Id. To be absolutely clear, because the program is initiated and supervised by NSA officials, there cannot be a warrant involved since there is no judicial integration in the process. HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 434 2006 2006] DOWN TO THE WIRE: ASSESSING THE CONSTITUTIONALITY II. WIRETAPPING-THE GENESIS A. Origins A recorded directive for warrantless surveillance for national security purposes was detailed in a letter from President Franklin Delano Roosevelt to Attorney General Robert Jackson during World War Hl. 3' In that letter, Roosevelt authorized Jackson to secure sensitive information from any person suspected of seditious conduct against the United States.32 President Roosevelt specifically asked Jackson to investigate only non-citizens and exercise considerable restraint.33 At the time, Roosevelt's directive conformed to the letter of the existing law, 4 because the U.S. Supreme Court, in 1928, had concluded 3 that executive wiretapping did not impinge on constitutional rights. a6 1. Olmstead v. United States The issue in Olmsteadcentered around the propriety of governmental use of warrantless electronic surveillance equipment.37 The question was whether the information obtained by electronic surveillance was in violation of the Fourth Amendment and could not be used as evidence in any subsequent prosecution. 3 To allow illegally obtained evidence would, in effect, violate the Fifth Amendment's protection against selfincrimination; for if a person's incriminating statement, intercepted illegally, could be used against him in a subsequent prosecution, this would effectively destroy his right to avoid testifying against himmself. In Olmstead, federal agents used wiretap devices placed on telephone wires outside the defendant's premises to record incriminating information that led to the subsequent prosecution of the defendant. 39 No judicial warrants authorized the wiretaps.' 31. Michael Disabatino, Annotation, Construction andApplication of "NationalSecurity" Exception to Fourth Amendment Search Warrant Requirement, 39 A.L.R. FED. 646 (2002). 32. Id. 33. Id. 34. Id. 35. Olmstead v. United States, 277 U.S. 438 (1928). 36. Id. at 466. 37. See id. at 438. 38. See id. at 455. 39. Id. at 456-57. 40. See Omstead, 277 U.S. at 456-58. HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 435 2006 UNIVERSITY OF FLORIDA JOURNAL OF LAW & PUBLIC POLICY [Vol. 17 The two major issues before the U.S. Supreme Court were: 1) whether such wiretaps constitute an unreasonable search and seizure in violation of the Fourth Amendment; and 2) if so, whether the Fifth Amendment forbids the evidentiary use of such information at trial on the grounds that such evidence would violate the defendant's right not to testify against himself.4 ' The Court found that the wiretap did not violate the Fourth Amendment, and therefore, the information obtained could be used in a subsequent prosecution without violating the Fifth Amendment.42 The Court noted that a search warrant would be required before officers could enter the property of a suspect to gather evidence, and that such a warrant would have to be supported by a showing of probable cause that the suspect was engaged in illegal activities. Further, the warrant would have to describe the items sought. 3 Although a warrant would be necessary for a search and seizure, the Court found that the Constitution did not protect telephone and telegraph messages: The reasonable view is that one who installs in his house a telephone instrument with connecting wires intends to project his voice to those quite outside, and that the wire beyond his house and messages while passing over them are not within the protection of the Fourth Amendment. We think, therefore, that the wiretapping here disclosed did not amount to search or seizure within the meaning of the Fourth Amendment.' Since there was no physical trespass on the defendant's property, the Court concluded a violation of the Fourth Amendment did not occur.45 Olmsteadthus established the first major criterion by which to judge the legality of warrantless wiretaps. Justice Brandeis, in dissent, pointed to the dangers of such a restrictive view, noting that: "Time works changes, brings into existence new conditions and purposes. Therefore, a principle to be vital must be capable ' Brandeis also to wider application than the mischief which gave it birth."46 recognized that new electronic innovation created new means of violating 41. 42. 43. 44. 45. 46. Id.at 460-62. Id.at 466-69. Id. at 458-62. Id. at 466. Olmstead, 277 U.S. at 466. Id. at 472. HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 436 2006 DOWN TO THE WIRE: ASSESSING THE CONSTITUTIONALITY constitutional protections in ways unforeseen by the Framers of the Constitution." 48 Brandeis argued that it was not Citing Entrick v. Carrington, the physical trespass that constituted the principal offense to the individual, but the invasion of the individual's privacy that caused the real damage.49 Notwithstanding Brandeis's warning, wire and radio communications were deemed subject to warrantless interception.5" In 1934, Congress moved to protect radio and wire communications from unauthorized interception by enacting section 605 of the Communications Act.5 This Act forbade any person from intercepting and divulging interstate wire and radio communications without authorization from the sender of such messages, or without meeting other enumerated conditional requirements." 2. Nardone v. UnitedStates53 Since section 605 reads that "no person" may intercept and divulge protected communications to "any person," a question arose as to the applicability of these provisions to federal and state officers, as well as to private individuals. Nardone v. United States' was the first opportunity the Supreme Court had to address the confusion surrounding section 605. In Nardone, information was uncovered by federal officers through a warrantless wiretap on the defendant's conversations.55 The Court held that such evidence was inadmissible in a subsequent prosecution of the defendant. The fact that the eavesdroppers were federal officers did not sway the Court, which said that the statute "is written so as to include within its sweep federal officers as well as others."56 Nardone was the Court's attempt to settle the question of the applicability of section 605 to state and federal officers. The case was reheard in 1939.7 In the second Nardone58 case, the Court ruled that even 47. 48. 49. 50. 51. 52. 53. 54. 55. 56. 57. 58. Id.at 473. 19 How. St. Tr. 1030 (1765). Olmstead, 277 U.S. at 474-79. See supra text accompanying notes 37-45. 47 U.S.C. § 605 (1934). Nardone v. United States, 302 U.S. 379 (1937). Id.at 379. Id.; see also Benati v. United States, 355 U.S. 96 (1957). Nardone, 302 U.S. at 379, 381-82. Id.at 384. Id. Nardone v. United States, 308 U.S. 338 (1939). HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 437 2006 UNIVERSITY OF FLORIDA JOURNAL OF LAW & PUBLIC POLICY [Vol. 17 a paraphrased account ofthe intercepted communications was inadmissible evidence, when the interception was in violation of section 605."9 The Court specified that although a paraphrased account was not a literal divulgence of the precise communications intercepted, nevertheless, such warrantless interception and use was prohibited by the statute and the account was inadmissible as evidence.6' The government concluded that at the time President Roosevelt issued the directive, the government, utilizing war powers, could wiretap telephone communications without prior judicial scrutiny. 61 However, President Roosevelt could not legally introduce any of the collected information into trial. 62 The Nardone63 Court concluded that the Federal Communications Act of 1934 prohibited individuals from collecting or distributing information collected via electronic surveillance. 64 The government conceded that Nardone prohibited any information collected in the course of electronic surveillance from being offered into evidence at trial. 65 There was, however, nothing to prevent police agencies from utilizing wiretaps for national security purposes as long as the information was not "divulged" in a court proceeding.6 67 3. Katz v. UnitedStates In Katz v. UnitedStates,6 the post-war U.S. Supreme Court revisited expectations of privacy within the context of wiretapping jurisprudence. Overruling Olmstead, the Supreme Court found the use of warrantless electronic surveillance in criminal investigations was per se unreasonable under the Fourth Amendment.69 Without a warrant, wiretapping and searches could only be legally conducted pursuant to a "few welldelineated [Fourth Amendment] exceptions."70 59. Id. at 339-41. 60. Id.at 340-41. 61. See Disabatino, supra note 31. 62. See Jennifer L. Sullivan, From "ThePurpose"to "A SignificantPurpose:"Assessing the Constitutionalityof the ForeignIntelligence SurveillanceAct Under the FourthAmendment, 19 NOTRE DAME J.L. 375, 383 (2005). 63. Nardone, 302 U.S. at 379. 64. Id at 382. 65. See Sullivan, supranote 62, at 384. 66. Id. 67. 389 U.S. 347, 357 (1967). 68. Id. 69. Id. at 375. 70. Id. HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 438 2006 DOWN TO THE WIRE: ASSESSING THE CONSTITUTIONALITY In Katz, the Court rejected the traditional notion that only private property could be protected by the Fourth Amendment and held that "[T]he Fourth Amendment protects people, not places."7 In so doing, the Court reversed the defendant's conviction for transmitting wagering information by telephone in violation of a federal statute.7 2 The FBI had placed a recording device outside the phone booth that recorded the defendant's end of telephone conversations without first getting a warrant-leading to the defendant's conviction.73 The U.S. Supreme Court reversed the decision of the lower court, finding that the surveillance failed to meet the preconditions required by the Fourth Amendment.7 4 The U.S. Supreme Court's reasoning in Katz, however, turned on the government's failure to satisfy the preconditions of the Fourth Amendment in securing a warrant before conducting surveillance, rather than sanctioning the government for conducting clandestine surveillance. The Court has long held that the Fourth Amendment protects individuals against police officers-particularly those officers engaged in the often competitive enterprise of ferreting out a crime-from prematurely making the inferences required to determine probable cause for a search under the Fourth Amendment.7" In Katz, the Court reversed the defendant's conviction because the officers did not seek a "neutral and detached magistrate" to make the probable cause determination in accordance with prior case law in Coolidge v. New Hampshire.76 However, in footnote 23 of Katz, the limitations upon the Court become apparent. The Court was divided as to whether the Fourth Amendment contemplated a national security exception.77 The majority specifically declined to consider whether such an exception existed.78 In his concurrence, Justice White stated that the executive branch did not need a warrant if the President determined that there was a threat to national security.79 In a separate concurrence, Justice Douglas stated that the executive branch required a warrant because neither the President nor the Attorney General was capable of acting as a detached and neutral magistrate, as the Fourth Amendment requires.80 Therefore, as of the Katz 71. 72. 73. 74. 75. 76. 77. 78. 79. 80. Id.at 351. Katz, 389 U.S. at 359. Id.at 349-50. Id.at 359. Johnson v. United States, 333 U.S. 10, 14 (1948). 403 U.S. 443, 453 (1971). See Disabatino, supra note 31. Id. Id. Id. HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 439 2006 UNIVERSITY OFFLORIDA JOURNAL OFLA W & PUBLIC POLICY [Vol. 17 decision, the U.S. Supreme Court had yet to issue a coherent precedent on warrantless surveillance for national security purposes. Codifying the Katz standard, Congress passed title II of the Omnibus Crime Control and Safe Streets Act (OCCA). 1 Under OCCA, electronic surveillance could only be conducted with a warrant.8 2 Such a warrant could be issued if a judge found probable cause that "an individual is committing, has committed, or is about to commit a particular offense . . ."" However, like Katz, OCCA did not place limits on the President's discretion to use warrantless wiretaps for national security s Taking full advantage of the confusion, the executive purposes.8 branch-led by Lyndon B. Johnson and then Richard Nixon--continued warrantless surveillance as if the executive branch possessed complete and unfettered autonomy in national security missions." B. Keith and the Legality of Wiretappingfor Domestic Threats to NationalSecurity In an effort to clarify the legality of warrantless surveillance, the U.S. Supreme Court considered whether the Fourth Amendment contained a national security exception. 6 In UnitedStates v. U.S. DistrictCourtfor the Eastern District of Michigan (Keith), the government, without prior judicial review, intercepted communications of an individual who conspired to bomb a federal building. 7 The government argued that warrantless surveillance was necessary to protect the country from "attempts of domestic organizationsto attack and subvert the existing [government] structure. ' 8 8 In addition, the government urged that (1) the judicial branch did not have the practical knowledge to determine whether probable cause existed to believe that surveillance was necessary to protect national security and (2) that the inclusion of the judicial branch would result in leaks of sensitive information to the public. 9 The Keith Court agreed that the "covertness and complexity"9 of political subversives and 81. 82. 83. 84. 85. 86. 87. 88. 89. 90. See Sullivan, supranote 62, at 386. Id. (quoting 18 U.S.C. § 3518(3)(a) as amended (2000)). See id. See id. See United States v. U.S. Dist. Ct. (Keith), 407 U.S. 297, 311 n.10 (1972). Id.at 299. Id.at 299-302. Id.at 308-09. Id.at 319. See Keith, 407 U.S. at 311. HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 440 2006 DOWN TO THE WIRE: ASSESSING THE CONSTITUTIONALITY their "dependency . . . upon the telephone"'" makes wiretapping an effective weapon.9 2 However, the Keith court was profoundly apprehensive of the invasive nature of electronic surveillance.93 Recognizing that the "broader spirit" of the Fourth Amendment was to shield private communications from unreasonable surveillance,94 the Keith Court analyzed two central inquiries relating to domestic national security: (1) "whether the needs of citizens for privacy and free expression may not be better protected by requiring a warrant" 95 and (2) "whether a warrant requirement would unduly frustrate the efforts of the government to ' protect itself."96 In response to the first Keith inquiry, the Court held that basic constitutional freedoms are best served through the distinct function of the different branches of government.97 According to the Court, judicial review of executive action by a neutral and detached magistrate is the touchstone of preserving privacy and free expression.9" As such, the proper function of the branches is for the executive branch to seek a warrant and for the judicial branch to approve the warrant prior to the search.99 Specifically citing Justice Douglas's concurrence in Katz, the Court explained that the Fourth Amendment did not contemplate the government as a neutral and detached magistrate because of the government's responsibility to prosecute and investigate criminal behavior.' 0 Thus, the Court held that citizens' needs for privacy and free expression would be best served by securing a warrant through the judicial branch.'0° In response to the second Keith question, the Court recognized the validity of the government's argument that warrantless surveillance was an extremely efficient method of investigation.0 2 However, the Court was not convinced that the judicial branch was inept to analyze domestic national security threats. 3 Rather, the Court responded that the judicial branch was perfectly competent to evaluate whether a warrant was needed 91. 92. 93. 94. 95. 96. 97. 98. 99. 100. Id. Id. Id. Id. at313. See Keith, 407 U.S. at 315. Id. Id. at317. Id. at318. Id. at317. Keith, 407 U.S. at 317. 101. See id. at 320. 102. See id. at 319. 103. Id. at 320. HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 441 2006 UNIVERSITY OF FLORIDA JOURNAL OFLAW& PUBLIC POLICY [Vol. 17 because the court regularly dealt with sensitive and complex issues central to domestic national security. Furthermore, the Court found that the involvement of the judicial branch did not create domestic national security vulnerabilities."° Concluding the Keith analysis, the Court held that domestic government surveillance must comport to the requirements of the Fourth Amendment. 5 Specifically, the Court held that the government must seek the approval of the judicial branch through a warrant prior to the initiation of homeland electronic surveillance.0 6 However, the Court expressly reserved judgment on whether the Keith analysis applied to the "activities of foreign powers or their agents"'0 7 outside of the United States. C. Attempts to Extend the Keith Doctrine to Foreign Threats The refusal to consider whether the Fourth Amendment contemplated a foreign national security exemption prompted lower courts to fill in the gap.'08 In United States v. Brown," 9 the Fifth Circuit Court of Appeals allowed warrantless electronic surveillance for the purpose of protecting national security from a foreign threat."0 Accepting the Brown precedent, the Third Circuit, in UnitedStates v. Butenko,"' agreed that the President had the authority to conduct warrantless surveillance against foreign threats to national security. 1 2 However, the Butenko court limited the Brown decision by stating that the primary purpose of the surveillance must be for foreign security threats, as opposed to the collection of incriminating information for criminal prosecution." 3 Casting the viability ofBrown and Butenko into serious doubt, the U.S. Court of Appeals for the D.C. Circuit strongly questioned the existence of a foreign national security exemption in Zweibon v. Mitchell."4 In Zweibon, the government used warrantless surveillance against the Jewish Defense League (JDL), an entity composed of American citizens, because the JDL sought to interrupt U.S.-Soviet diplomatic relations through both 104. 105. 106. 107. 108. 109. 110. 111. 112. 113. 114. Id. at 320-21. Keith, 407 U.S. at 321. See id. Id. at 321-22. See Sullivan, supra note 62, at 388-89. 484 F.2d 418 (5th Cir. 1973). Id. at 426. 494 F.2d 593 (3d Cir. 1974). Id.at605. Id. at606. 516 F.2d 594 (D.C. Cir. 1975). HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 442 2006 DOWN TO THE WIRE: ASSESSING THE CONSTITUTIONALITY peaceful and violent measures." 5 While the Zweibon court disfavored any sort of warrantless surveillance, it did not go so far as to deny the existence of a foreign national security exemption.1 6 Rather, the Zweibon court held that the government violated the Fourth Amendment's protections because the JDL was a domestic organization and was not affiliated with any foreign power." 7 As such, the Zweibon decision put a stop to the rubberstamping of warrantless surveillance afforded to the executive branch in Brown and Butenko. This outcome proved to be quite alarming to the Department of Justice as the executive branch previously had few obstacles to conducting electronic surveillance for foreign security 8 purposes." At about the same time as the Zweibon court heightened judicial scrutiny of warrantless surveillance, the Senate Select Committee to Study Governmental Operations chaired by Senator Frank Church" 9 (the "Church Committee") voted "to conduct an investigation and study of governmental operations with respect to intelligence activities and of the extent, if any, to which illegal, improper, or unethical activities were engaged in by any agency of the Federal Government."' 2 ° The Committee's investigation lasted fifteen months and addressed an exhaustive list of issues.' 2 ' The Committee's report contained thousands of pages detailing highly disturbing, questionable, and illegal, activities and programs. These programs targeted U.S. and foreign citizens domestically and abroad, by agencies such as the CIA, FBI, and NSA.'22 In response to the question of warrantless surveillance, the Committee reported: The courts have also not confronted intelligence issues. As the Supreme Court noted in 1972 in commenting on warrantless electronic surveillance, "The practice has been permitted by successive presidents for more than a quarter of a century without 115. Id. at 607. 116. Id. at 614. 117. Id. 118. See Richard Seamon & William Gardner, The PatriotAct and the Wall Between Foreign Intelligence and Law Enforcement, 28 HARv. J.L. & PUB. POL'Y 319, 334 (2005). 119. Frank Church Papers, Boise State University, Special Collections Department, Albertsons Library, availableat http://Iibrary.boisestate.edu/special/church/church.htm (last visited Oct. 3 1, 2006). 120. S. Res. 21, 94th Cong. (1975) (enacted). 121. DONALD J. MUSCH, CIVIL LIBERTIES AND THE FOREIGN INTELUGENCE SURVEILLANCE 3 (Donald J. Musch ed., 2003). 122. Frank Church Papers, supra note 119. HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 443 2006 UNIVERSITY OF FLORIDA JOURNAL OF LAW & PUBLIC POLICY [Vol. 17 guidance12 3 from the Congress or a definitive decision by the Court.' The Church Committee then issued as a major finding: The intelligence community has employed surreptitious collection techniques-mail opening, surreptitious entries, informants, and traditional and highly sophisticated forms of electronic surveillance-to achieve its overly broad intelligence targeting and collection objectives ... 124 The Committee added that the legal proceedings and standards regulating the use of such surreptitious collection techniques were insufficient. 125 In response, the Church Committee recommended additional rules regarding domestic intelligence activities; these recommendations "influenced the passage of the Foreign Intelligence Surveillance Act ("FISA") of 1978. ' '126 D. The Legislative Response: FISA The abuses brought to light by the Church Committee included the collection of personal and political information from individuals and organizations including Dr. Martin Luther King, Jr. and the Women's Liberation Movement. 27 The Committee's recommendations and its conclusion that the information collected had no legitimate governmental purpose 11 resulted in a public outcry for reform.129 In fact, the government often collected information simply for the purpose of "stifling domestic dissent [by] giving the incumbent President politically useful information about the opponents .... ,,30 With the public incensed by the Church Committee Reports and the judiciary eager to abridge executive surveillance power, Congress set out to regulate the executive use of warrantless surveillance.' 31 Congress's efforts culminated in the passage of the FISA, which authorized the executive branch, after securing a warrant, to conduct electronic 123. MUSCH, supra note 121, at 3. 124. Id. at 4. 125. 126. 127. 128. 129. 130. 131. See id. Id. Seaman & Gardner, supra note 118, at 335. Id. Id. at 334. See id. at 335. Id. at 334-36. HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 444 2006 DOWN TO THE WIRE: ASSESSING THE CONSTITUTIONALITY surveillance of "foreign powers" and "agents of foreign powers" for "foreign intelligence information."' 32 FISA created a specialized court system to grant authorization to conduct electronic surveillance of foreign powers and their agents for foreign intelligence gathering purposes.'33 FISA authorizes the Chief Justice of the U.S. Supreme Court to designate seven U.S. district court judges to constitute a lower court (FISA Court), and to designate three judges from U.S. district courts or U.S. courts of appeal to constitute a court of review (FISA Court of Review).'34 The FISA Court of Review has jurisdiction to review a FISA Court denial of an application submitted under the Act.' 35 If the FISA Court of Review determines that the denial was proper, the U.S. Supreme Court then has jurisdiction to review the decision.'36 To obtain a warrant under FISA, the executive branch must appeal to the Foreign Intelligence Surveillance Court (FISC), a specially created court of review consisting of federal district court judges.'37 Under FISA, the FISC will allow surveillance if there is probable cause to believe that the "purpose of the surveillance is to obtain foreign intelligence information." 138 In the event of a national emergency, 139 the President may authorize immediate warrantless surveillance provided that the executive obtains a warrant within seventy-two hours. 40 With a warrant requirement firmly in place, FISA's approach to surveillance for foreign intelligence has been repeatedly upheld throughout the federal circuits. 4 ' In United States v. Duggan,'4 2 the Second Circuit Court of Appeals held that the warrant mechanism in FISA was "a constitutionally adequate balancing of the individual's Fourth Amendment rights against the nation's need to obtain foreign intelligence 132. 50 U.S.C. § 1804(a)(4)(A) (1978). 133. Id. § 1803(a). 134. Id. § 1803(a), (b). 135. Id. § 1803(b). 136. Id. 137. See 50 U.S.C. § 1803(a). 138. See id. § 1804(a)(7)(B). FISA's probable cause standard was later amended so that law enforcement officials need only demonstrate that "a significant purpose of the investigation" be for foreign security purposes. See id. (amended 2001). 139. See generallyIn re Sealed Case No. 02-001,02-002, 310 F.3d 717 (Foreign Int. Sur. Ct. Rev. 2002) (analyzing this issue). 140. See 50 U.S.C. § 1804(f). 141. See Sullivan, supra note 62, at 393. 142. 743 F.2d 59 (2d Cir. 1984). HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 445 2006 UNIVERSITY OFFLORIDA JOURNAL OF LAW& PUBLIC POLICY [Vol. 17 information."' 43 Likewise, in UnitedStates v. Pelton,'" the Fourth Circuit Court of Appeals held that FISA's reduced probable cause standard was "sufficient protection for the rights guaranteed by the Fourth Amendment"' 45 because of the paramount importance of governmental interests in the context of foreign security.'" With FISA looming in the background, the Fourth Circuit Court of Appeals revisited the familiar issue of executive warrantless surveillance for foreign security threats in United States v. Truong. 47 In Truong, outside the authority of FISA, and without a warrant, the government wiretapped David Truong, a Vietnamese citizen suspected of passing classified information to the Socialist Republic of Vietnam.14' Deciding the extent that warrantless surveillance should be allowed for foreign national security, the Truong court reexamined the two central inquiries in Keith that were relevant to domestic national security threats: (1) whether the needs of citizens would be better protected by requiring a warrant and (2) whether a warrant requirement would unduly frustrate the 49 government's national security prerogatives. Responding to the first prong of the Keith test, the Truong court recognized the substantial privacy interests implicated by warrantless surveillance.15 °However, the Truong court stated that the intrusion on civil liberties is justified when (1) the surveillance is limited to "foreign powers, their agents, and their collaborators"' 5 ' and (2) the surveillance is primarily ' to "obtain foreign intelligence from foreign powers or their assistants. "152 Responding to the second prong, the Truong court stated that the warrant requirement would add an unnecessary procedural hurdle that would impede the response to foreign threats.' 53 Further, the Truong court reasoned that the executive's "unparalleled expertise" in foreign affairs made the executive branch the sole entity capable of evaluating the gravity of foreign security threats.' 54 Finally, the Truong court stated that the 143. 144. 145. 146. 147. 148. 149. 150. 151. 152. 153. 154. Id. at 73. 835 F.2d 59 (2d Cir. 1987). Id. at 1075. Id. 629 F.2d 908, 911 (4th Cir. 1980). Id. Id. at 913. Id. at 916. Id. Truong, 629 F.2d at 916. Id. at914. Id. HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 446 2006 DOWN TO THE WIRE: ASSESSING THE CONSTITUTIONALITY Constitution designates the executive as the primary authority in governing 155 international affairs. As a final matter, the Truong court recognized that even where a warrant is unnecessary, the Fourth Amendment demands that the surveillance be reasonable in light of the circumstances.' 56 The Truong court drew the reasonableness line at the point where David Truong became the target of a criminal investigation, and held that warrantless surveillance of foreign security threats was reasonable up to the point where the foreign security threat could be fully evaluated.'57 According to the Truong court, the surveillance is no longer reasonable at the point where the individual becomes the subject of a criminal prosecution.'58 E. September I I th and the Genesis of the NSA Program On September 11, 2001, the al-Qaeda terrorist network launched the most devastating attack ever witnessed on American soil.'5 9 Decimating critical U.S. economic and military interests, nineteen al-Qaeda terrorists hijacked and crashed four jetliners into the two World Trade Center Towers, the Pentagon, and a field in Pennsylvania."' ° In the span of one hour, the terrorists killed nearly three thousand people, devastated the nation's financial pulse, and awakened America to its own vulnerability. 6 ' Seven days after the September 11th attacks, Congress passed the Authorization for Use of Military Force (AUMF). 162 In the AUMF, 155. Id. at914. 156. Id. at916. 157. Truong, 629 F.2d at 916. Truong alleged that the search was unreasonable in light of the circumstances because the government intercepted all of his personal communications for over 260 days. See id. at 916-17. The Truong court held that the search was reasonable up to the point when FBI investigators identified Truong's contact on the other side of the communications. Id. at 916 n.6. After that point, Truong became the target of a criminal investigation because the foreign security threat had been fully evaluated. See id. at 915-17. 158. Id. 159. Letter from the Department of Justice to Members of Congress, Legal Authorities Supporting the Activities of the NationalSecurity Agency Describedby the President 1 (Jan. 19, 2006) [hereinafter Department of Justice], available at http://www.globalsecurity.org/intell/ library/reports/2006/nsa-authorities doj060119.htm. 160. See Sullivan, supra note 62, at 380. 161. Id. 162. Authorization for Use ofMilitary Force 50 U.S.C. § 1541 (2001). Section 2 of the AUMF provides, in relevant part, that: [T]he President is authorized to use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 447 2006 UNIVERSITY OF FLORIDA JOURNAL OF LAW & PUBLIC POLICY [Vol. 17 Congress granted the President the authorization to "use all necessary and appropriate force"' 6 3 against those responsible for the September 11th attacks."6 The government's response to September 11 th was swift and multifaceted. 65 ' The United States immmediately accused the Taliban, the ruling government of Afghanistan, of harboring the al-Qaeda operatives responsible for the September 11th assault.'" After the Taliban refused to hand over al-Qaeda fugitives, the United States led an offense against the Taliban government beginning on October 7,2001.167 Operation Enduring Freedom, the U.S. military response to the September 1Ith attacks, was swift and ferocious. 68 Ending major combat operations less than a year after the original invasion, the United States began to embark 69 on the arduous task of building a democracy in war-torn Afghanistan. But the global war against terrorism required action in the homeland as well. In an effort to rectify legislative deficiencies in law enforcement and intelligence collection, U.S. lawmakers passed the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 (Patriot Act).170 The Patriot Act lowered the standard of probable cause under FISA so that a law enforcement official could obtain a warrant upon a showing of probable cause that "a significant purpose of the investigation" was for foreign surveillance purposes. '7' This lower standard effectively removed the barrier that previously separated criminal investigations from foreign intelligence surveillance under FISA. 72 harbored such organizations or persons, in order to prevent any future acts of international terrorism against the United States by such nations, organizations or persons. 50 U.S.C. § 1541(2)(a). Further, section 2 of the AUMF provides, in relevant part, that: "Consistent with [the War Powers Resolution], the Congress declares that this section is intended to constitute specific statutory authorization within the meaning of section 5(b) of the War Powers Resolution." 50 U.S.C. § 1541(2)(b)(1). 163. Supra note 162. 164. Supra note 162. 165. See Sullivan, supra note 62, at 396. 166. Edward Epstein, U.S. Seizes Skies OverAfghanistan, S.F. CHRON., Oct. 10, 2001, at Al. 167. Id. 168. Bill Nichols, US. Controls Afghan Skies, USA TODAY, Oct. 10, 2001, at IA. 169. Larry Copeland, Afghans OptimisticAssembly Will End Chaos, USA TODAY, June 10, 2002, at IA. 170. See Sullivan, supra note 62, at 380-83. 171. 50 U.S.C. § 1804(a)(7)(B) (amended 2001). 172. See Sullivan, supra note 62, at 401. HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 448 2006 DOWN TO THE WIRE: ASSESSING THE CONSTITUTIONALITY The controversy regarding the NSA program began on December 6, 2005-mere hours after the New York Times published its original article on the NSA. 173 Yet, the NSA wiretapping program had been in existence since President Bush authorized the program in the weeks following the September 11 th attacks.174 The program remains classified, and few critical details have come to light. According to the Bush Administration's 175 statements, the NSA program: (1) intercepts electronic communications; (2) intercepts communications of American citizens inside the United States; 176 (3) operates without the "classical" definition of probable cause; 177 and (4) operates without a warrant.178 With these facts in mind, the purpose of the following analysis is to evaluate the most pressing question posed by the NSA program: Does the President have the authority to use warrantless surveillance against American citizens living in the homeland? II. THE PRESIDENT LACKS BOTH THE CONGRESSIONAL AUTHORIZATION AND INHERENT AUTHORITY TO EFFECTUATE THE NSA PROGRAM On January 19, 2006, the Department of Justice submitted a letter to congressional leaders on behalf of President Bush detailing the Administration's defense of the NSA program. "9The letter is the fullest, most complete defense the Administration has offered regarding the NSA program. In the letter, the President offers two bases of support for the NSA program: (1) Congress authorized the President to wiretap American citizens without a warrant through the passage of the AUMF; and (2) the 173. See Leonnig & Linzer, supra note 20. 174. See President's Radio Address, 41 Weekly Comp. Pres. Doc. 1880 (Dec. 17, 2005), available at http://www.whitehouse. gov/news/releases/2005/12/20051217.html (last visited Oct. 19, 2006). In his weekly radio address, the President said: "In the weeks following the terrorist attacks on our Nation, I authorized the National Security Agency, consistent with U.S. law and the Constitution, to intercept the international communications of people with known links to al-Qaeda and related terrorist organizations." Id. 175. Press Briefing, supranote 29. 176. Id. 177. Id. According to Attorney General Gonzales, the NSA program intercepts communications where there is a "reasonable basis to conclude that one party to the communication is a member of al-Qaeda, affiliated with al-Qaeda, or a member of an organization affiliated with al-Qaeda, or working in support of al-Qaeda." Id. 178. Id. 179. Department of Justice, supra note 159, at 1. HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 449 2006 UNIVERSITY OF FLORIDA JOURNAL OFLA W & PUBLIC POLICY [Vol. 17 President has the inherent80 authority as Commander-in-Chief to conduct warrantless surveillance.1 However, these justifications may not withstand a vigorous constitutional analysis.. While President Bush may believe he has the authority for the NSA program, case law. in the area of warrantless surveillance does not support the President's argument.'' Congress did not explicitly authorize the President to conduct warrantless surveillance of American citizens by the passage of the AUMF.182 Furthermore, a careful consideration of the principles articulated in Keith, public policy, and in particular its underlying concerns, reveals that the President does not have the inherent authority to conduct warrantless surveillance. Because the President has only questionable congressional or inherent executive authority, the NSA program is unlikely to survive a constitutional challenge. A. The PresidentLacks CongressionalAuthority to Effectuate the NSA Program President Bush's principal assertion in defense of the NSA program is that Congress unequivocally authorized the executive branch to effectuate the program through the passage of the AUMF. 183 Relying on Hamdi v. Rumsfeld,184 the President argues that the AUMF provides explicit statutory authority to conduct warrantless surveillance of American citizens who have a link to al-Qaeda. 8 5 In Hamdi, the U.S. Supreme Court considered whether the text of the AUMF enabled the President to capture and detain enemy combatants.8 6 Yasser Hamdi, an American citizen allegedly operating as an enemy combatant, was captured and detained after U.S. Forces found him on a battlefield in Afghanistan.1 7 Hamdi challenged his detention, arguing that Congress had previously passed a law stating that "[n]o citizen shall be imprisoned or otherwise detained by the United States except pursuant to an Act of Congress."'8 8 As such, 180. Id. 181. See infra text accompanying notes 241-54. 182. See supra text accompanying notes 183-228. 183. Department of Justice, supra note 159, at 12. 184. 542 U.S. 507 (2004). 185. See Department of Justice, supranote 159. 186. See Hamdi, 542 U.S. at 516. 187. Id. at 513. 188. See id. at 517 (emphasis added) (quoting 18 U.S.C. § 4001(a)). HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 450 2006 DOWN TO THE WIRE: ASSESSING THE CONSTITUTIONALITY Hamdi contended that the limited text of the AUMF 18 9 was an insufficient basis for his detention. 190 Rejecting Hamdi's argument, the Supreme Court interpreted the clause in the AUMF that permitted the President to use "all necessary and appropriate force" to mean that the AUMF authorized the President to engage in all "fundamental incident[s] of waging war...."'91 Relying on the Geneva Convention Relative to the Treatment of Prisoners of War and the Hague Convention on Laws and Customs of War on Land, the Court held that the detention of enemy combatants was a fundamental incident of warfare.' 92 Accordingly, the text of the AUMF "clearly and unmistakably authorized" the President to detain Hamdi. 193 President Bush interprets Hamdi to mean that the AUMF authorizes the executive branch to conduct all activities that are fundamental incidents of waging war.' 94 Citing a robust history of American warfare,' 9 5 the President contends that intelligence collection is a fundamental incident of war. 96 Since the NSA program is a form of intelligence collection, the President insists that the AUMF authorizes him to conduct warrantless 97 surveillance. 189. See supratext accompanying note 162. According to the Court, the President derived his authority to detain enemy combatants pursuant AUMF language that states the President may use "all necessary and appropriate force" against the "nations, organization, or persons" associated with the September 1 th attacks. Id. 190. See Hamdi, 542 U.S. at 517. 191. Id. at 519. Writing for a plurality of the Court, Justice O'Connor stated: In light of these principles, it is of no moment that the AUMF does not use specific language of detention. Because detention to prevent a combatant's return to the battlefield is a fundamental incident of waging war, in permitting the use of "necessary and appropriate force," Congress has clearly and unmistakably authorized detention in the narrow circumstances considered here. Id. 192. 193. 194. 195. 196. Id.at 519-20. Id. at 519. See Department of Justice, supra note 159. See infra text accompanying notes 202-04. See Department of Justice, supra note 159. The Department of Justice Brief states that the interception of communications has been an American war tactic since the Revolutionary War. Specifically, "George Washington received and used to his advantage reports from American intelligence agents on British military strength, British strategic intentions, and British estimates of American strength. One source of Washington's intelligence was intercepted British mail." Id. (citations omitted). 197. Id. HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 451 2006 UNIVERSITY OF FLORIDA JOURNAL OF LAW & PUBLIC POLICY [Vol. 17 However, the President may have misplaced his reliance in Hamdi. The conduct might only be applicable in the context of a battlefield. 9 ' In Hamdi, Justice O'Connor clarified the scope of the opinion: [W]e understand Congress' grant of authority for the use of "necessary and appropriate force" to include the authority to detain for the duration of the relevant conflict, and our understanding is based on longstanding law-of-war principles. If the practical circumstances of a given conflict are entirely unlike those of the conflicts that informed the development of the law of war, that understanding may unravel.'99 Thus, while Hamdi surely applies to tactics on a battlefield in Afghanistan, the scope of Hamdi may not reach endeavors that involve American civilians.2 °° In evaluating the NSA program, the application of Hamdi turns on deciding if the "practical circumstances" of the present war on terror are similar enough to those found in the prior, conventional conflicts that formulated the rules of warfare.2 ' The President argues that intelligence collection is the practical circumstance common to both the present war and conventional warfare. Because intelligence collection has been a vital feature of many wars, the President further asserts that the use of such tactics in the present conflict triggers the application of the Hamdi rule.20 2 Beginning with the Revolutionary War, the President notes that various intelligence collection methods have been used throughout American warfare.2 3 For example, George Washington intercepted British mail,2" Civil War generals frequently wiretapped telegraph lines,20 5 and President Roosevelt authorized warrantless wiretapping against persons suspected of espionage.20 6 Therefore, the Bush Administration argues that the NSA program falls in line with the Hamdi analysis because the larger context 198. Memorandum from Elizabeth B. Bazan & Jennifer K. Elsea, Congressional Research Service, Presidential Authority to Conduct Warrantless Electronic Surveillance to Gather Foreign Intelligence Information 34 (Jan. 5, 2006) [hereinafter Bazan & Elsea], available at http://news. findlaw.com/hdocs/docs/nsa/crslO506rpt.pdf (last visited July 12, 2006). 199. Hamdi v. Rumsfeld, 542 U.S. 507, 521 (2004). 200. Id. 201. See id. 202. See Department of Justice, supra note 159, at 14-16. 203. Id. 204. Id. at 15-16. 205. Id. 206. Id. HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 452 2006 DOWN TO THE WIRE: ASSESSING THE CONSTITUTIONALITY of intelligence collection has been used throughout the history of American warfare.2" 7 However, the "practical circumstances" of a war against terrorism are quite unlike those of the "conflicts that informed the development of the law of war."2 8 The war against terror is unlike any previous American war. It is a war without borders, without a specific opposing government, without uniforms, and without a clearly discernable enemy acting under color of state. As such, Hamdi's application to the less conventional circumstances of the current conflict, especially those conducted within the United States, may unravel the "understanding" of Hamdi.2 °9 Thus, even if the NSA program were found to be a "fundamental incident of war" under Hamdi, the program still may be illegal because Hamdi likely has no application to tactics waged inside the homeland and far away from the battlefield. Even if Hamdi were found to control the analysis of the NSA program, it is inconclusive whether warrantless surveillance of American citizens meets the AUMF's requirement that the tactic be a fundamental incident of war.2"0 The Hamdi court concluded that the detention of enemy combatants was a fundamental incident of war by referring to the explicit text of both the Geneva Convention and the Hague Convention.2"' However, President Bush has not cited any authority similar in statute that suggests that warrantless surveillance of American citizens is a fundamental incident of war.2" 2 Moreover, the President has not cited any international regulation of warfare that suggests that any interception of communications is a fundamental incident of war.2 3 Additionally, even if Hamdi were found to control the constitutional analysis of the NSA program, and warrantless surveillance of American citizens was found to be a fundamental incident of war, the President 207. See Department of Justice, supra note 159, at 14-16. 208. See Bazan & Elsea, supra note 198, at 33 (citing Hamdi (O'Connor, J., concurring). 209. Id 210. Beth Nolan et al., On NSA Spying: A Letter to Congress, 53 N.Y. REV. BOoKS (Feb. 9, 2006), availableat http://www. nybooks.com/articles/1 8650 (last visited Oct. 19, 2006). As stated by the letter from constitutional scholars: "[i]t is one thing, however, to say that foreign battlefield capture of enemy combatants is an incident of waging war that Congress intended to authorize. It is another matter entirely to treat unchecked warrantless domestic spying as included in that authorization...- Id. 211. Hamdi v. Rumsfeld, 542 U.S. 507, 520 (2004). 212. Bazan & Elsea, supra note 198, at 35. 213. Id. To be fair, there is little doubt that intelligence collection on the battlefield is a fundamental incident of war. But again, the NSA program is a different situation because it involves the surveillance of American citizens on American soil. Id. HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 453 2006 UNIVERSITY OF FLORIDA JOURNAL OF LAW& PUBLIC POLICY [Vol. 17 would still not have congressional authorization.2 ' Congress, through FISA, has already expressly addressed the question of wartime warrantless surveillance, stating that a President may authorize electronic surveillance for up to fifteen days following a declaration of war.215 The Supreme Court has consistently held that express and "carefully drawn" statutes supersede general statutes in the event of a conflict.2" 6 The President insists that the "necessary and appropriate" clause of the AUMF provides all the necessary authority to conduct unlimited wartime warrantless surveillance-a highly technical, complex, and controversial legal issue. In terms of specificity, the AUMF simply does not compare with FISA.217 FISA expressly establishes procedures for domestic wartime surveillance whereas the AUMF broadly grants general authority. 2 8 Because FISA specifically establishes procedures for warrantless electronic surveillance, FISA must prevail over the NSA program. The exclusivity provision contained in section 2511 (2)(f) of title Ill of the OCCA further undermines the President's arguments.2" 9 There, Congress identified FISA 220 as the "exclusive means by which electronic surveillance ...and the interception of domestic wire, oral, and electronic communications may be conducted. 22 1 In the Department of 214. See Nolan et al., supra note 210, at 3-4. 215. Id. 216. See Int'l Paper Co. v. Ouelette, 479 U.S. 484, 493-94 (1987). In Int'l Paper,the U.S. Supreme Court refused to believe that a statute drawn specifically to address a particular purpose could be thrown into question by a general statutory provision. Id. 217. See Nolan et al., supra note 210, at 3. 218. Id. Under FISA, "[t]he President, through the Attorney General, may authorize electronic surveillance without a court order under this subchapter to acquire foreign intelligence information for a period not to exceed fifteen calendar days following a declaration of war by the Congress." 50 U.S.C. § 1811. 219. See supra text accompanying notes 81-83. 220. See Nolan et al., supra note 210, at 3. 221. 18 U.S.C. § 2511 (2)(f) (amended 2002). Section (2)(f), reproduced in full, provides: Nothing contained in this chapter or chapter 121 or 206 of this title, or section 705 of the Communications Act of 1934, shall be deemed to affect the acquisition by the United States Government of foreign intelligence information from international or foreign communications, or foreign intelligence activities conducted in accordance with otherwise applicable Federal law involving a foreign electronic communications system, utilizing a means other than electronic surveillance as defined in section 101 of the Foreign Intelligence Surveillance Act of 1978, and procedures in this chapter or chapter 121 and the Foreign Intelligence Surveillance Act of 1978 shall be the exclusive means by which electronic surveillance, as defined in section 101 of such Act, and the interception of domestic wire, oral, and electronic communications may be conducted. HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 454 2006 DOWN TO THE WIRE: ASSESSING THE CONSTITUTIONALITY Justice letter, the President claims that the OCCA exclusivity provision supports the legality of the NSA program: By expressly and broadly excepting from its prohibition electronic surveillance undertaken "as authorized by statute," section 109 of FISA [ 18 U.S.C. 1809] permits an exception to the "procedures" of FISA referred to in 18 U.S.C. § 251 1(2)(f) where authorized by another statute, even if the other authorizing statute does not specifically amend section 2511 (2)(f). 222 According to President Bush, OCCA declares FISA to be the exclusive protocol for electronic surveillance, and FISA, in return, allows another statute-in this case the AUMF-to authorize electronic surveillance. To be specific, the President refers to section 109 of FISA because it prohibits all electronic surveillance conducted "under color of law except as authorized by statute. "223 Under the President's conception, the AUMF provides the necessary statutory exception required by that provision. Therefore, in the President's view, the OCCA exclusivity provision does not bar the NSA program because FISA actually authorizes electronic surveillance via the AUMF.224 But if this were correct, the exclusivity provision would essentially be rendered meaningless because it would not exclude anything.225 If the President were correct, then the text of the OCCA section should read to prohibit electronic surveillance except "as authorized by FISA or any other statute. ,226 To accept the President's argument, one must believe that Congress, by passing a statute that declared FISA the exclusive protocol for electronic surveillance, actually intended that FISA be exclusive-but so is any other statute that Id. While the aforementioned statute is long and complex, a careful reading clearly demonstrates that FISA is the exclusive authority for "electronic surveillance." Id. To restate, while foreign intelligence may be collected by other specifically mentioned statutes, only FISA is the authority on electronic surveillance. Also, please note that section "101" of FISA became § 1801. 222. Department of Justice, supra note 159, at 23. 223. 50 U.S.C. § 1809(a)(1). Section 1809(a)(1) provides, in relevant part, that a "person is guilty of an offense if he intentionally engages in electronic surveillance under color of law except as authorized statute." 224. William Moschella, Asst. Attorney General, Department of Justice, Letter to Chairman of the Senate Select Committee on Intelligence (Dec. 22, 2005) [hereinafter Letter from Moschella], at http://www.epic.org/privacy/terrorism/fisa/nsaletterl22205.pdf. 225. Bazan & Elsea, supra note 198, at 41. 226. See id. at 40. Bazan and Elsea focus on section 2511 (2)(e) when stating that the provision should be read to exempt electronic surveillance "as authorized by FISA or any other statute." However, since the President takes the same approach to OCCA's exclusively provision, Bazan and Elsea's analysis is equally applicable. Id. HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 455 2006 UNIVERSITY OF FLORIDA JOURNAL OF LAW & PUBLIC POLICY [Vol. 17 implicates electronic surveillance. On that basis, it is a fair inference that the true intent of Congress in passing an exclusivity provision was to actually make FISA's comprehensive statutory scheme the exclusive means to conduct electronic surveillance. Moreover, Congress last reviewed the OCCA exclusivity provision on November 25, 2002,227 which was two months after the passage of the AUMF. According to the Bush Administration, congressional leaders were briefed on the NSA program "more than a dozen times., 22' The President's argument implies that Congress gave its silent acquiescence to the program by not changing the parameters of section 2511(f) upon receiving knowledge as to the mechanics of the NSA program. However, the President cannot plausibly suggest that Congress's inactions were an official approval of the NSA program. In fact, it is because Congress was aware of the NSA program, yet chose not to affirmatively sanction the program, that the legality of the NSA is now in doubt. The reasons for this doubt are: (1) the President's reliance on the Hamdi precedent may be misplaced; (2) the President has failed to demonstrate that the warrantless surveillance of American citizens is a "fundamental incident of war"; and (3) Congress most likely intended that FISA's comprehensive regulations be the exclusive protocol for warrantless surveillance, the President appears to lack congressional authorization to effectuate the NSA program. B. The PresidentLacks the InherentAuthority to Effectuate the NSA Program 229 In the seminal opinion of Youngstown Sheet & Tube Co. v. Sawyer, Justice Jackson discussed the latitude of discretion afforded to a President whose acts defy the will of Congress: When the President takes measures incompatible with the expressed or implied will of Congress, his power is at its lowest ebb, for then he can rely only upon his constitutional powers minus any constitutional powers of Congress over the matter. Courts can sustain exclusive Presidential control in such a case only by disabling the Congress from acting upon the subject. Presidential claim to a power at once so conclusive and preclusive must be 227. See 18 U.S.C. § 2511 (2002). 228. Letter from Moschella, supra note 224, at 1. 229. 343 U.S. 579 (1952). HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 456 2006 DOWN TO THE WIRE: ASSESSING THE CONSTITUTIONALITY scrutinized with caution, for what is at stake is the equilibrium established by our constitutional system.23° Because the NSA program is at odds with FISA, the President's power is at its lowest ebb. Therefore, the legality of the program is cast into serious doubt. Thus, the President must rely on his inherent executive authority under Article H of the Constitution in order to effectuate the NSA program. Relying on his role as Commander-in-Chief and his authority as the final arbiter of international relations, the President asserts that the 231 Constitution compels him to "protect the Nation from foreign attack., The President argues that he must have the "authority to gather information necessary for the execution of his office. 232 Additionally, the President insists that he enjoys a heightened level of authority because he is presently acting as the Commander-in-Chief during wartime.233 While the President is correct that he enjoys substantial authority in international relations 234 and in his capacity as Commander-in-Chief, 23 5 the President's actions must still comport to the rest of the Constitution. 236 As a separate consideration in Hamdi, the Supreme Court held that a President, even while acting in the course of his capacity of Commanderin-Chief, must do so under the precepts of the Constitution. 23 ' To that end, even if the President has the inherent authority to conduct warrantless surveillance of some sort, his activities must comport to Fourth Amendment standards.238 230. Id. at 637-38. (Jackson, J., concurring). 231. See Department of Justice, supra note 159, at 4. 232. Id. 233. Id. 234. See United States v. Curtiss-Wright Exp. Corp., 299 U.S. 304, 319 (1936). The U.S. Supreme Court has stated "[t]he President is the sole organ of the nation in its external relations, and its sole representative with foreign nations." Id. 235. See Chi. & S. Air Lines v. Waterman S.S. Corp., 333 U.S. 103, 111 (1948). 236. See Hamdi v. Rumsfeld, 542 U.S. 507, 532-35 (2004). 237. In Hamdi, the U.S. Supreme Court concluded that, even though the President had the authority to detain Yasser Hamdi as an enemy combatant, Hamdi must still be afforded his due process rights. See Hamdi, 542 U.S. at 533-36. By analogy then, the President must observe the requirements of the Fourth Amendment in the course of his duties as Commander-in-Chief. 238. The Fourth Amendment of the Constitution, reproduced in full, provides: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 457 2006 UNIVERSITY OF FLORIDA JOURNAL OF LAW & PUBLIC POLICY [Vol. 17 The U.S. Supreme Court has expressly declined to consider whether the Fourth Amendment allows the executive branch to conduct warrantless surveillance against American citizens for security from foreign threats.239 Despite the lack of precedent, the Keith case offers the most direct and relevant mode of analysis in the evaluation of the NSA program. 24" The legality of the NSA program turns on the two central Keith inquiries: (1) "whether the needs of citizens for privacy and free expression may not be better protected by requiring a warrant" 241' and (2) "whether a warrant requirement would unduly frustrate the efforts of Government to protect 242 itself. In response to the Keith analysis, the President insists that he has the inherent authority to conduct the NSA program because the "President has uniquely strong constitutional powers in matters pertaining to foreign affairs and national security. "243 It is true that President Bush enjoys a heightened authority as Commander-in-Chief in the realm of foreign affairs. But, as stated by Justice O'Connor, this heightened authority "is not a blank check 244 for the President when it comes to the rights of the citizens.", Nation's Examining the NSA program under the first tier of the Keith analysis, the citizens' needs for privacy and free expression would unquestionably be best protected by requiring a warrant. The Keith court recognized that the commands of the Fourth Amendment cannot be swept aside for the sake of administrative efficiency.245 On behalf of the Keith majority, Justice Powell wrote: The warrant clause of the Fourth Amendment . ..has been a "valued part of our constitutional law for decades, and it has particularly describing the place to be searched, and the persons or things to be seized. U.S. CONST. amend. IV. 239. See United States v. U.S. Dist. Ct. (Keith), 407 U.S. 297, 321-22 (1972). 240. In support of his assertion that the NSA program comports to the standards of the Fourth Amendment, the President cites: United States v. Truong, 629 F.2d 908, 913-14 (1980); United States v. Butenko, 494 F.2d 593, (3d Cir. 1974); and United States v. Brown, 484 F.2d 418,425-26 (5th Cir. 1973). See Department of Justice, supra note 159, at 5. These cases all implicate Keith as the starting point for the analysis of the President's authority to conduct warrantless surveillance. 241. See Keith, 407 U.S. at 315. 242. Id. 243. See Department of Justice, supra note 159, at 5. 244. Hamdi v. Rumsfeld, 542 U.S. 507, 537 (2004). 245. See Keith, 407 U.S. at 315. HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 458 2006 DOWN TO THE WIRE: ASSESSING THE CONSTITUTIONALITY determined the result in scores and scores of cases in courts all over this country. It is not an inconvenience to be somehow weighed against the claims of police efficiency. It is, or should be, an important working part of our machinery of government, operating as a matter of course to check the well-intentioned but mistakenly over-zealous executive officers' who are a party of any system of law enforcement." 2 ' There is no substitute for a warrant based on probable cause to protect the rights of citizens. The warrant requirement ensures that the public will be free from undue and burdensome governmental intrusion. Yet in contravention of this essential constitutional command, the NSA program does not require a warrant.247 The absence of this crucial constitutional protection undermines the legality of the program.248 Instead of a warrant, the NSA program operates on a standard of suspicion that has never been recognized by the U.S. Supreme Court, or any other court. The NSA program is triggered when the Administration has a "reasonable basis to conclude that one party to the communication is a member of al-Qaeda, affiliated with al-Qaeda, or a member of an organization affiliated with al-Qaeda, or working in support of al' Qaeda."249 The NSA program's impossibly broad standard is nearly infinite in application.25 As suggested by Professor Laurence Tribe, 25' "a United States citizen living here who received a phone call from another United States citizen who attends a mosque that the administration believes is 'supportive' of al-Qaeda could be wiretapped without a warrant. '25 2 The lack of a workable standard of probable cause forces the conclusion that the privacy rights of citizens would best be protected by requiring a warrant. Worst of all, the NSA program is an unchecked exercise of executive power. In the NSA program, only the executive branch concludes whether an individual is affiliated with al-Qaeda. 25 In Keith, Justice Powell recognized the inherent danger of that situation: 246. See id. (quoting Coolidge v. New Hampshire, 408 U.S. 443, 481 (1971)). 247. Press Briefing, supranote 29, at 2. 248. See Nolan et al., supra note 210, at 6. 249. Press Briefing, supranote 29, at 1. 250. See Nolan et al., supra note 210, at 6. 251. Laurence Tribe is a constitutional law scholar and the Carl M. Loeb Professor of Law at Harvard University, at www.law.harvard.edu/faculty/directory/facdir.php?id=74 (last visited Oct. 19, 2006). 252. Id. 253. Press Briefing, supra note 29, at 2. HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 459 2006 UNIVERSITY OFFLORIDA JOURNAL OF LAW & PUBLIC POLICY [Vol. 17 Fourth Amendment freedoms cannot properly be guaranteed if domestic security surveillances may be conducted solely within the discretion of the Executive Branch. The Fourth Amendment does not contemplate the executive officers of Government as neutral and disinterested magistrates. Their duty and responsibility are to enforce the laws, to investigate and to prosecute. The historical judgment, which the Fourth Amendment accepts, is that unreviewed executive discretion may yield too readily to pressures to obtain incriminating evidence and overlook potential invasions of privacy and speech.254 The NSA program is plagued with a conflict of interest. It is devoid of judicial intervention. Without the cooperation of the judiciary, there is no check on law enforcement officials who are quick to ignore potential errors in judgment when the prosecution of a suspected terrorist is in sight. It is irrelevant that the Administration has the best intentions of ending global terrorism; the NSA program is simply too susceptible to abuse. The failure of the Administration to integrate the judicial branch undermines the indispensable system of checks and balances on which this government is based. As such, the program raises significant concerns under the Fourth Amendment. As necessary as a warrant may be, the President may still be able to continue the NSA program if he can prove under the second tier of Keith that obtaining a warrant would unduly frustrate the intent of the government to protect the nation from foreign security threats. President Bush relies primarily on the reasoning articulated in Truong255 to demonstrate that a warrant requirement poses an undue burden under the Keith analysis.256 As stated in Part I, Truong held that a warrant requirement may be unnecessary for foreign security because: (1) a 254. United States v. U.S. Dist. Ct. (Keith), 407 U.S. 297, 316-17 (1972). 255. To be fair, the President also relies on Brown and Butenko to assert that he has the inherent authority to conduct warrantless surveillance. He states: [t]he courts uniformly have approved this longstanding Executive Branch practice. Indeed, every federal appellate court to rule on the question has concluded that, even in peacetime, the President has inherent constitutional authority, consistent with the Fourth Amendment, to conduct searches for foreign intelligence purposes without securing a judicial warrant. Department of Justice, supra note 159, at 5. This Article will respond to the Truong analysis because it is the clearest and most recent opinion and Truong was decided in the wake of FISA. 256. Id. at 9. HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 460 2006 DOWN TO THE WIRE: ASSESSING THE CONSTITUTIONALITY warrant requirement places an inefficient procedural hurdle on the President; 257 (2) the executive branch is an expert on foreign affairs; 258 and (3) the Constitution designates the President as the authority in international affairs. 259 As such, the President contends he has inherent authority260to authorize warrantless surveillance for the reasons set forth in Truong. The President's arguments are not unique. The cited reasons for excusal from the warrant requirement were considered and rejected by the 261 While still mindful of the President's substantial grant Zweibon court.26 of power in the realm of foreign affairs, the Zweibon court-over thirty years ago-confronted the arguments that the President advances today.262 The Zweibon court found that the warrant requirement was not an inefficient procedural hurdle because judges are not "insensitive or uncomprehending of the issues involved in foreign security,, 263 and therefore the judges "will not deny any legitimate requests for a warrant. ' '2' The Zweibon court recognized that the executive branch was the expert on foreign affairs.265 However, the Court noted that the judicial branch was perfectly capable of understanding the complexities and dimensions of the international arena.266 As stated in Zweibon, "If the threat is too subtle or complex for our senior law enforcement officers to convey its significance to a court, one may question whether there is probable cause for surveillance., 2 67 Finally, while the Constitution does designate the President as the authority in international affairs, the Zweibon court reasoned that the President's authority must be tempered with careful judicial scrutiny.2 68 In short, a warrant requirement does not pose an undue burden on the executive branch. 257. 258. 259. 260. 261. 262. 263. 264. 265. 266. 267. 268. United States v. Truong, 629 F.2d 908, 913 (4th Cir. 1980). Id. at 914. Id. See Department of Justice, supra note 159, at 5. See supra text accompanying notes 262-67. See Zweibon v. Mitchell, 516 F.2d 594, 640-44 (D.C. Cir. 1975). Id.at 641-42. Id. at 642. See id. at 641 n.120. Id.at 641. Zweibon, 516 F.2d at 641. Id. HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 461 2006 UNIVERSITY OF FLORIDA JOURNAL OF LAW & PUBLIC POLICY [Vol. 17 IUl. RECOMMENDATIONS TO CURE THE NSA PROGRAM'S ILLEGALITY As a matter of policy, it is important to recognize the undeniably grave concerns faced by the executive branch in a time of war. The President argues: [T]he Government's interest in engaging in the NSA activities is the most compelling interest possible-securing the Nation from foreign attack in the midst of an armed conflict. One attack already has taken thousands of lives and placed the Nation from attack is perhaps the most important function of the federal Government-and one of the few express obligations of the federal Government enshrined in this Constitution.269 The President is correct in his assessment of the gravity of the threat of global terrorism. To that end, he must have all the appropriate tools to counter that threat. But the President has a lawful and effective weapon at his disposal in FISA. FISA strikes the appropriate balance between the necessity of law enforcement and the protection of civil liberties. On the other hand, the NSA program is a threat to all the rights of every citizen for privacy and free expression. Thus, the NSA program should be revised in a manner that would make it consistent with FISA and the Constitution. First, to cure any question of illegality, the President should command the administrators of the NSA program secure a warrant prior to surveillance of an individual. The Supreme Court has long recognized that a warrant, based on probable cause, adequately protects an individual's right to privacy. 270 A warrant requirement would integrate the judicial branch into the NSA program. The courts, a neutral and detached third party, would be able to evaluate the evidence against an individual and determine whether the intrusion is justifiable. After a court has granted a warrant, the executive branch is free to pursue an aggressive surveillance of the individual suspected of terrorist behavior. The current level of suspicion required to effectuate the NSA program must be elevated so that it resembles a standard of probable cause already sanctioned by the courts. The Patriot Act amended FISA so that the executive may secure a warrant for electronic surveillance based on probable cause that a "significant purpose of the investigation" is for foreign intelligence purposes.27 ' The Foreign Intelligence Surveillance 269. See Department of Justice, supra note 159, at 20. 270. See United States v. U.S. Dist. Ct. (Keith), 407 U.S. 297, 315-17 (1972). 271. 50 U.S.C. § 1804(a)(7)(B) (amended 2001). HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 462 2006 DOWN TO THE fTRE: ASSESSING THE CONSTITUTIONALITY Court of Review, the appellate branch of FISA, determined that this reduced standard of probable cause has been recognized as an adequate safeguard of civil liberties.272 The current standard of the NSA program, that one is "affiliated" with al-Qaeda, should be elevated so that the NSA program is in line with standing precedent of a legally recognized standard of probable cause. In the event that securing a warrant is impossible because of the imminence of an attack, the NSA program should conform to the provisions of FISA. Under § 1805(f) of FISA, the President may authorize instant electronic surveillance of an individual provided that the executive branch received a warrant within 72 hours.2 73 If the NSA program conformed to § 1805(f), the President would be adequately able to respond to emerging terrorist threats while still providing due deference to civil liberties. Amending the NSA program will provide the President with an effective means to defend the nation from a terrorist attack and win the war against terror. By requiring a warrant, elevating the standard of probable cause, and providing an emergency surveillance provision, the NSA program will also protect civil liberties. With these recommendations in effect, the NSA program could be a valid and effective tool against terror that is fully consistent with the Constitution. IV. CONCLUSION: THE RULE OF LAW: AN ESSENTIAL ELEMENT TO WINNING THE "WAR ON TERROR" It is lamentable, that to be a good patriot one must become the enemy of the rest of mankind. -Voltaire America will never be destroyed from the outside. If we falter, and lose our freedoms, it will be because we destroyed ourselves. -Abraham Lincoln These final thoughts are an expansion of earlier efforts to find the elusive middle ground between a rule of law and a rule by law post 9/1 1.274 272. In re Sealed Case No. 02-001, 310 F.3d 717, 719-20 (Foreign Int. Sur. Ct. Rev. 2002). 273. 50 U.S.C. § 1805(f) (2006). 274. Supra text accompanying note 2. HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 463 2006 UNIVERSITY OF FLORIDA JOURNAL OF LA W & PUBLIC POLICY [Vol. 17 There are currently two ongoing debates regarding the rule of law within the context of the war on terror. On the one hand, we have those who argue that the war on terror is a "new paradigm" that does not neatly lend itself to the rules and norms of international law or to traditional U.S. democratic principles such as the right to due process, the right of privacy, the freedom of association.2 75 This position is summed up by U.S. Vice President Cheney who exclaimed that the United States "must be-willing to go to the 'dark side' to fight terrorism" and that "[a] lot of what needs 276 to be done here will have to be done quietly, without any discussion. The war on terror is summarily and singularly about overwhelming, supreme emergencies where there is no time for debate, deliberation, or choice. The "war" necessitates unprecedented governmental opaqueness, secrecy, intrusion, and renders "quaint" 277 the traditional rules of war and democratic values of due process, equal protection, privacy, and human dignity enshrined within the U.S. Constitution and international 27 Reducing the war on terror to exigent circumstances is agreements.8 sheer fantasy--constituent consumption, intended to be consumed without pause of thought. Attempts at limiting the entire debate on how best to 275. Robert 0. Boorstin, Memorandum on the Geneva Conventions: TossingAside the Geneva Conventions, Bush Decisions PlaceU.S. Troops in GreaterDanger,May 18, 2004, at http://www. americanprogress.orglissues/kfiles/b79532.html (last visited Oct. 19,2006); U.S. Attorney General Alberto Gonzales, Memorandum for the President of the United States, Decision Regarding Application of the Geneva Conventions of War to the Conflict with al-Qaeda and the Taliban, January 25,2002, availableathttp://www.msnbc.msn.com/id/4999148/site/newsweek/ (last visited Oct. 19, 2006). See generally DAVID COLE & JAMES X. DEMPSEY, TERRORISM AND THE CONSTITUTION: SACRIFICING CIVIL LIBERTIES IN THE NAME OF NATIONAL SECURITY (2002); see also DAVID COLE, ENEMY ALIENS: DOUBLE STANDARDS AND CONSTITUTIONAL FREEDOMS IN THE WAR ON TERRORISM (2003). 276. Elisa Massimino, Heading Toward the 'Dark Side,' L.A. TIMES, Nov. 21, 2005, at B11, available at http://www.common dreams.org/views05/1121-25.htm (last visited Oct. 19,2006); The Vice President Appears on Meet the Press with Tim Russert, Sept. 16, 2001, available at http://www.whitehouse.gov/vicepresident/news-speeches/speeches/vp20010916.html (last visited July 12, 2006). 277. Gonzales, supra note 275. 278. See, e.g., David E. Sanger & Eric Schmitt, Bush Says He's Confident That He and McCain Will Reach Agreement On Interrogation, N.Y. TIMES, Dec. 13, 2005, at A22, available at http://www.nytimes.com/2005/12/13/politics/13detain.html (July 12, 2006) (describing how the White House "prefers, in background conversations, to talk about the 'doomsday scenario': What would happen if the president believed a nuclear device had been planted in an American city, and interrogators had just minutes to extract information about its location from a terror suspect?" and quoting William H. Taft, IV, who served as the State Department's legal advisor during President Bush's first term, that Senator John McCain's amendment to ban inhumane and degrading treatment of detainees "calls for conduct to be consistent with the Army field manual, but doesn't presuppose what that is to be"). HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 464 2006 DOWN TO THE WIRE: ASSESSING THE CONSTITUTIONALITY combat global terrorism to a false premise based upon ticking time bombs and imminent attacks from terrorists and rogue states is a political ploy that has little to do with reality in most cases. Will the result of such interference be civil war? In reality, the lion's share of combating global terrorism comprises a web of complexities. Its components include methodically and painstakingly acquiring bits of intelligence and piecing them together into a larger mosaic. By seizing and freezing assets of terrorists and terrorist organizations, implementing foreign policies and employing diplomatic pressure on states susceptible to terrorist activities, a responsible war on global terrorism can be waged. Many terrorist plots, including the 9/11 attacks on the United States, are not planned or carried out in minutes, hours, or even days. They appear to be the product of patient and methodical planning by terrorists over the course of years and span several continents.279 In all but the most extreme circumstances, combating global terrorism should be a deliberate, debatable, multilateral undertaking; the combat efforts should always operate within the parameters of the rule of law. The Framers of the U.S. Constitution appeared to concede that the office of the chief executive needed to exercise a limited amount of secrecy, 280 speed, 279. See Maria Ressa, Ressa:Hambalithe al Qaeda,JemaahIslamiyahLink, CNN.COM, Aug. 14,2003, availableat http://www.cnn.com/2003/WORLD/asiapcf/southeast/08/14/otsc.ressa/index. html (last visited July 12, 2006). Riduan Isamuddin, a key al-Qaeda figure in Asia who is also known as Hambali and one of the leaders of Jemaah Islamiyah, al-Qaeda's arm in Southeast Asia, organized a meeting of about halfa dozen al-Qaeda senior leaders in Malaysia in 2000, which basically was one of the first planning sessions of the 9/11 attack. Among the leaders who attended those meetings was the man who was believed to be the mastermind of the "USS Cole" as well as the bombing operations within Southeast Asia, itself. Three of the September 11 hijackers were also at that meeting. Id.; see also CNN presents: Seeds of Terror, CNN television broadcast, aired June 15, 2003, (tracing the roots of ai-Qaeda to Southeast Asia, based on a terrorist plot that occurred in that region in 1995, which was a blueprint for what happened on September 11,2001). See also JEAN-CHARLES BRISARD & GUILLAUME DASQUIE, FORBIDDEN TRUTH: U.S.-TALBAN SECRET OIL DIPLOMACY AND THE FAILED HuNT FOR BIN LADEN (2002). 280. THE FEDERALIST No. 64, at 394 (John Jay) (recognizing the need for "perfect SECRECY and immediate DESPATCH [sic]" within the executive in order for him or her to execute treaties and for "the business of intelligence," when "the most useful intelligence may be obtained, if the persons possessing it can be relieved from apprehensions of discovery"); but see Bill of Rights, U.S. CONST. amend. I, Ill, IV, V VI, IX, & XIV. HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 465 2006 UNIVERSITY OF FLORIDA JOURNAL OF LAW& PUBLIC POLICY [Vol. 17 and dispatch to protect the national security of the United States.2 8 ' The Framers, having an aversion to unaccountable standing armies, also agreed that significant war powers would be vested in Article I, the legislative branch, as a means of establishing a check on the executive's powers as Commander-in-Chief.28 2 The Framer's fear of limitless power of the executive vis-6-vis as Commander-in-Chief of the armed forces is evidenced in the Declaration of Independence and in the Bill of Rights-the latter serving as a further check on executive power. Thus, while it is fairly clear that the President has some powers under Article II to preserve, protect, and defend the nation as Commander-in-Chief, it is also equally clear that those powers were never intended to be plenary.283 If this were so, then we would have no need for little inconveniences such 281. See U.S. CONST. art. II, § 2 ("The President shall be the Commander in Chief of the Army and Navy of the United States, and of the Militia of the several States .... "); see also id art. II, § 1 (stating the President has a fundamental duty to "preserve, protect, and defend the Constitution"); United States v. U.S. Dist. Ct. (Keith), 407 U.S. 297 (1972). Implicit in that duty is the power to protect our Government against those who would subvert or overthrow it by unlawful means. In the discharge of this duty, the President-through the Attorney General-may find it necessary to employ electronic surveillance to obtain intelligence information on the plans of those who plot unlawful acts against the Government. Id. at 310; but see U.S. CONST. art. III; Keith, 407 U.S. at 316. Fourth Amendment freedoms cannot properly be guaranteed if domestic security surveillances may be conducted solely within the discretion of the Executive Branch... [t]he historical judgment, which the Fourth Amendment accepts, is that unreviewed executive discretion may yield too readily to pressures to obtain incriminating evidence and overlook potential invasions of privacy and protected speech. Keith, 407 U.S. at 316. 282. U.S. CONST. art. I, § 8 ("Congress shall have power To... provide for the common Defence ... To declare War ...To raise and support Armies ...To provide and maintain a Navy ...[and t]o make all Laws which shall be necessary and proper for carrying into Execution the foregoing Powers, and all other Powers vested by this Constitution..."). 283. See, e.g., United States v. Ehrlichman, 376 F. Supp. 29, aft'd, 546 F.2d 910 (D.C. Cir. 1976), cert. denied, 429 U.S. 1120 (1977) (explicating at note 4 "The doctrine of the President's inherent authority as 'the sole organ of the nation in its external relations,"' 10 ANNALS OF CONG. 613 (1800) (remarks ofJohn Marshall); United States v. Curtiss-Wright Exp. Corp. I, 299 U.S. 304, 319 (1936). None of these cases purport to deal with the constitutional rights of American citizens or with presidential action in defiance of congressional legislation. When such issues have arisen, executive assertions of inherent authority have been soundly rejected. See Kent v. Dulles, 357 U.S. 116, 129-30 (1958); Youngstown Sheet & Tubing Co. v. Sawyer, 343 U.S. 579 (1975); see also U.S. CONST. art. II, § 3 (establishing that the President of the United States "shall take Care that the Laws be faithfully executed.. .); id. art. II, § I (affirming that the President shall "preserve, protect and defend the Constitution of the United States"). HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 466 2006 20061 DOWN TO THE WIRE ASSESSING THE CONSTITUTIONALITY as having Congress battle over whether or not certain provisions of the Patriot Act should be extended, made permanent, or scrapped entirely. President Bush, acting under Article 11, could simply authorize the Patriot Act's mandates without congressional or judicial participation, 'and a police state would be created. Thus, we would have the President functioning under the rule by law and no longer under the constitutional rule of law.284 While it is conceded that one of the primary duties of any government is to ensure the survival of its legitimate governing regime and the physical safety of its citizens, an equally important duty is to preserve democracy and civil liberties and to fulfill obligations mandated under national, international, and humanitarian law. Are Chief Justice Warren's words applicable to the "war on terrorism"? 2 85 The answer is problematic, because the judicial branch of the U.S. government has just begun to awake from its post 9/11 slumber and is considering constitutional values within the context of the present crisis. The Supreme Court, long before 9/11, introduced a crime control model of governance which is now firmly in place.286 The President and attorney general continually speak in terms of a "war on terror," however, this is a war that is both undeclared and unending. Since Marbury v. Madison,"7 judicial review has been constitutionally mandated where constitutional issues emerge.288 No one objects to a society seeking to protect itself and its institutions from assault, regardless of whether the threat comes from at home or abroad. However, within a constitutional democracy model, protection includes democratic values that are enshrined within one's constitution. It is unacceptable to infringe upon and subvert human rights unless a tested, factual basis for infringement emerges.289 This is supposed to be the goal of judicial review. It is not appropriate for a President to create law through speeches to selected receptive audiences or a cowering press. Governmental intervention must be constitutionally tested within the 284. See Fletcher Baldwin, The United States Supreme Court: A Creative Check of InstitutionalMisdirection, 45 IND. L.J. 550 (1970); see also Zagaris, infra note 290. 285. See supra text accompanying note 2. 286. Aharon Barak [President of the Supreme Court of Israel], A Judge on Judgingthe Role of a Supreme Court in a Democracy, 116 HARv. L. REv. 19, 27-46 (2002). 287. 5 U.S. 137 (1803). 288. See Barak,supra note 286, at 121-22. 289. See generally H.L.A. HART, THE CONCEPT OF LAW (1961). HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 467 2006 UNIVERSITY OF FLORIDA JOURNAL OFLAW& PUBLIC POLICY [Vol. 17 context of compelling credentials. 29" None have been shown in the present case. Anthony Lewis, New York Times editorial writer and author ofthe book Gideon 's Trumpet, articulated this more succinctly in the inaugural of the Joseph M. Reck, Distinguished Lecture Series at Emory University on March 19, 2003. Anthony Lewis's conclusion merits repeating. Summarizing the nature of the present administration's policy towards enemy combatants he stated: This is the crux of the Padillacase. Jose Padilla is not a person with a sympathetic record. But what matters is not his person, but the breadth of the claim made by Ashcroft and his lawyers. It is that they can keep any American citizen-any of us-in prison for the rest of our lives, in solitary confinement on the say so of government officials, with no check except the rather slim possibility of a judge finding that the government did not have any evidence. The administration argues that requiring it to treat Padilla with constitutional fairness would "significantly hamper the nation's defense." But if there is anything about which the press should be skeptical, it is such assertions that the national security would be at risk if courts applied the Constitution. For those claims have turned out to be wrong again and again. The Pentagon Papers case was an outstanding example. If the New York Times were allowed to publish its series on the origins of the Vietnam War, the government said, national security would be gravely damaged. On the fourth day of publication of the Times' lawyer, [the late Professor] Alexander Bickel, observed drily to the judge: 291 "Your Honor, the republic still stands." 290. See Bruce Zagaris, U.S. DistrictCourtReiteratesUS. TerrorSuspect's Right to Counsel, 19 INT'L ENFORCEMENT L. REP. 183 (2003). 291. Fletcher N. Baldwin, Jr. & Theresa A. DiPerna, The Rule of Law: An Essential Component of the Financial War Against Organized Crime and Terrorism in the Americas (unpublished conference materials), available at www.law.ufl.edu/cgr/ conference/06confmnaterials/2_Panel/2_FletcherBaldwin-Dipematerrorism.pdf; Anthony Lewis, Wake Up America, N.Y. TIMES, Nov. 30, 2001, at A27, availableat http://www.commondreams. org/views01/ 1130-05.htm (last viewed July 12, 2006). See Fletcher Baldwin, The Rule of Law, HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 468 2006 DOWN TO THE WIRE: ASSESSING THE CONSTITUTIONALITY V. EPILOGUE There should be no objection to a government protecting its people from assaults originating at home or from abroad. Protection, however, is only one factor in an array of constitutional principles. It is unacceptable to implement secret programs that diminish constitutional values while engaged in doublespeak policies. To defer to constitutional values and to diminish them, requires, at the least, a tested factual basis-not a sparse conclusion of efficacy. Herein lies the goal of Article III of the U.S. Constitution. On January 17, 2006, the American Civil Liberties Union, together with a collection ofjournalists, academics, and attorneys who maintained regular communication with persons who allegedly had links to al-Qaeda, filed a complaint against the NSA challenging the constitutionality of the warrantless wiretapping program."' On August 17, 2006, U.S. District Court Judge Taylor issued an opinion in the case of American Civil Liberties Union v. NationalSecurity Agency.293 In that opinion, Judge Taylor concluded that the wiretapping program was an unconstitutional exercise of executive power.29 4 The secret wiretapping impermissibly burdened the First and Fourth Amendment rights of the plaintiffs. 95 The plaintiffs asserted that the government violated their Fourth Amendment rights in several ways such as: 1) seizing their constitutionally protected communications without a warrant; 296 2) the program also violated First Amendment rights by the chilling effect of constant random surveillance; 297 and 3) the program exceeded the constitutional grant of executive power under the Separation of Powers doctrine. 98 The court noted that the wiretaps were a seizure that triggered the Fourth Amendment's protection against yielding "too readily to pressures Human Rights and ProportionalityAs Components of the War Against Terrorism: Is the U.S. Judiciary in Self-Imposed Exile?, 7 J. MONEY LAUNDERING 245 (2004). 292. Complaint regarding NSA http://www.aclu.org/pdfs/safefree/nsacomplaint.011706.pdf. The ACLU filed the suit in the United States District Court for the Eastern District of Michigan-the same court that decided Keith. See United States v. U.S. Dist. Ct. (Keith), 407 U.S. 297 (1972). 293. 438 F. Supp. 2d 754 (E.D. Mich. 2006). 294. Id. at 782. 295. Id. 296. See id. at 775. 297. Id. at 769-71. 298. ACLU, 438 F. Supp. 2d at 777-78. HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 469 2006 UNIVERSITY OF FLORIDA JOURNAL OF LAW & PUBLIC POLICY [Vol. 17 to obtain incriminating evidence and overlook potential invasions of privacy and protected speech." 2 The Fourth Amendment "requires reasonableness in all searches."3 ° Congress spoke in establishing the FISA; therefore, FISA lawfully provided the executive branch with numerous circumstances to conduct warrantless surveillance in times of emergency.30 ' However, the court held that Congress had not spoken with respect to the immensely invasive nature of the NSA program which was deemed objectively unreasonable in relation to the larger context of the body of law.30 2 In addition to addressing the violations of Fourth Amendment rights, the court also held that the NSA program unconstitutionally interfered with the plaintiff's First Amendment right to free expression.3 3 The court, strengthened by the earlier cases examining similar governmental regulation of protected speech, a" noted that a governmental action to regulate speech may be "justified only upon showing of a compelling governmental interest; and that the means chosen are least restrictive . .30" FISA had already lawfully provided the executive branch with the power to engage in warrantless surveillance, and therefore, the NSA program was not the least restrictive means of accomplishing national security goals. 3" The separation of power issue, the executive weapon for marginalizing Article Il review post 9/11, also invoked a judicial response. The court noted that the key to a free government is the lodging of the control of 299. Id. at 775 (citing United States v. U.S. Dist. Ct. (Keith), 407 U.S. 297, 315-17 (1972)). 300. Id. 301. Id. 302. See id. 303. ACLU, 438 F. Supp. 2d at 776. 304. Judge Taylor was very mindful that national security cases often present a mix of Fourth and First Amendment concerns. Id. Her recognition of the policy articulated in Keith is apt: Though the investigative duty of the executive may be stronger in [national security] cases, so also is there greater jeopardy to constitutionally protected speech. History abundantly documents the tendency of Government-however benevolent and benign its motives-to view with suspicious those who most fervently dispute its policies. Fourth Amendment protections become the more necessary when the targets of official surveillance may be those suspected of unorthodoxy in their political beliefs. Id. (citing United States v. U.S. Dist. Court, 407 U.S. 297, 313-14 (1972). 305. ACLU, 438 F. Supp. 2d at 776. 306. Id. HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 470 2006 DOWN TO THE WIRE: ASSESSING THE CONSTITUTIONALITY emergency powers outside the executive branch.3"' Recalling the seminal teachings of Justice Jackson in Youngstown Sheet and Tube Co. v. Sawyer,3 °8 the court recognized that when the President acts in contravention to the will of Congress, his power is at a minimum and he may only rely on his inherent constitutional power.3 9 Because the President squarely defied the will of Congress310as expressed through FISA, the President's power was at its lowest ebb As an alternative basis of support, that the President was actually acting in accord with Congress, the government argued that Congress implicitly authorized the NSA program with the passage of AUMF.3 ' The court, however, was not persuaded. 3 2 Noting that the rules of statutory construction require that the specific statutes govern those of general applicability, the court held that the highly specific commands of FISA overrule any suggestion of legality raised by the AUMF.31 3 Because the President lacked congressional authorization to effectuate the NSA program, the court acknowledged that any legal justification for the NSA program would have to stem directly from the President's inherent power under the Constitution.31 4 The court further noted that the executive branch is itself a creature of the Constitution, and therefore constrained by the limits of that document. As such, the court concluded that the actions taken by the executive must comport to the First and Fourth Amendments.31 5 Since the highly invasive nature of the NSA program violated those amendments, the President lacked inherent authority to authorize the program.316 In short, the NSA program was in direct violation of the liberties contained in the Constitution. Mindful of those liberties, the court concluded: "It was never the intent of the Framers to give the President such unfettered control, particularly where his actions blatantly disregard the parameters clearly enumerated in the Bill of Rights. ' ' 313178 With that, the court ordered an immediate halt to the program. 307. 308. 309. 310. 311. 312. 313. 314. Id.at 778. 343 U.S. 579 (1952). ACLU, 438 F. Supp. 2d at 777. Id.at 778. Id.at 779. Id. Id. ACLU, 438 F. Supp. 2d at 776. 315. Id.at 781. 316. Id. 317. Id.at 771 318. Id.at 782. HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 471 2006 UNIVERSITY OF FLORIDA JOURNAL OFLAW& PUBLIC POLICY [Vol. 17 The President has appealed the ruling; and the controversy is far from resolved.3" 9 The opinion of Judge Taylor has been assailed, and some critics argue it is thinly reasoned.32 ° To resolve the matter, the Bush Administration continues to request Congress grant explicit authorization for the NSA program.32 ' Judge Taylor's opinion may be overturned; however, Judge Taylor did more than just draft an opinion reaffirming the right of the people to be free from unreasonable search and seizure. She demonstrated that there are still those who not only read the Constitution of the United States, but also are willing to put their educated findings on paper for all to review. The post-9/1 1 attempts by the Bush administration to marginalize judicial review under Article Il of the U.S. Constitution have been met with considerable judicial opposition.3 22 Judge Taylor is not alone in her fidelity to her oath. Federal judges from all comers of the nation are now involved as partners in ensuring that the republic stands with the Constitution in tact. Judge Taylor reaffirms a basic principle of our Constitution: the Bill of Rights is not a suicide pact.323 Judge Taylor's opinion represents an acknowledgment of the importance of public review. Learned Hand noted long ago that Article I is not enough; the people must learn the difference between rights and doublespeak.124 As Learned Hand put it: "Liberty lies in the hearts of men and 2women; if it dies there, no constitution, no law, no court can save 5 it." 3 319. See Dan Eggan & Dafna Linzer, Judge Rules Against Wiretaps, WASH. POST, Aug. 18, 2006, at Al. 320. Id. 321. Id. 322. See, e.g., Hepting v. AT&T Corps., 439 F. Supp. 2d 974 (N.D. Cal. 2006); Doe v. Gonzales, 449 F.3d 415 (2d Cir. 2006); Hamdan v. Rumsfeld, 126 S. Ct. 2749 (2006). 323. See Baldwin, supranote 270, at 245. 324. See generally Timothy Lynch, Doublespeak and the War on Terrorism, Cato Inst. Briefing Papers No. 98, Sept. 6, 2006. 325. Id. at 11; Learned Hand, The Spirit of Liberty, in SPIRIT OF LIBERTY: PAPER AND ADDRESSES OF LEARNED HAND 189-90 (2d ed. 1953). HeinOnline -- 17 U. Fla. J.L. & Pub. Pol'y 472 2006
© Copyright 2026 Paperzz